diff options
author | Marc Zyngier <marc.zyngier@arm.com> | 2016-06-13 15:00:47 +0100 |
---|---|---|
committer | Christoffer Dall <christoffer.dall@linaro.org> | 2016-06-29 13:59:14 +0200 |
commit | 74a6b8885f7026e33f8a4776b7ac17c76b8e5a52 (patch) | |
tree | 694666822483772f344c336ae04c8ee854d667c3 /arch/arm/kvm | |
parent | 1166f3fe6a86798e4fcd24cefb6b06da3fd0420f (diff) | |
download | linux-74a6b8885f7026e33f8a4776b7ac17c76b8e5a52.tar.gz linux-74a6b8885f7026e33f8a4776b7ac17c76b8e5a52.tar.bz2 linux-74a6b8885f7026e33f8a4776b7ac17c76b8e5a52.zip |
arm/arm64: KVM: Enforce HYP read-only mapping of the kernel's rodata section
In order to be able to use C code in HYP, we're now mapping the kernel's
rodata in HYP. It works absolutely fine, except that we're mapping it RWX,
which is not what it should be.
Add a new HYP_PAGE_RO protection, and pass it as the protection flags
when mapping the rodata section.
Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Christoffer Dall <christoffer.dall@linaro.org>
Diffstat (limited to 'arch/arm/kvm')
-rw-r--r-- | arch/arm/kvm/arm.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c index 45dd6df70cdf..b30897679e53 100644 --- a/arch/arm/kvm/arm.c +++ b/arch/arm/kvm/arm.c @@ -1300,7 +1300,7 @@ static int init_hyp_mode(void) } err = create_hyp_mappings(kvm_ksym_ref(__start_rodata), - kvm_ksym_ref(__end_rodata), PAGE_HYP); + kvm_ksym_ref(__end_rodata), PAGE_HYP_RO); if (err) { kvm_err("Cannot map rodata section\n"); goto out_err; |